Endpoint & Device Security

Phishing Poses Top Cyber Risk to 2026 Winter Games
Endpoint & Device Security Phishing Poses Top Cyber Risk to 2026 Winter Games

As the world turns its attention to the spectacle of the Milano-Cortina Winter Games, a less visible but equally intense competition is unfolding in the digital realm, where cybercriminals are preparing to exploit the event's vast interconnected infrastructure. A recent assessment of the cyber

Weaponizing RMM Software – Review
Endpoint & Device Security Weaponizing RMM Software – Review

The silent infiltration of corporate networks has evolved far beyond custom-coded malware, with attackers now skillfully turning an organization's own trusted administrative tools against it. The weaponization of Remote Monitoring and Management (RMM) software represents a significant advancement

Trend Analysis: Sophisticated Ransomware Threats
Endpoint & Device Security Trend Analysis: Sophisticated Ransomware Threats

The discovery of a new ransomware family named Osiris in late 2025 serves as a stark reminder that the cyber extortion landscape is not just persistent but is actively accelerating in its complexity and lethality. Modern ransomware is no longer a simple act of digital vandalism; it has evolved into

How Is AI Fueling the GoBruteforcer Botnet?
Endpoint & Device Security How Is AI Fueling the GoBruteforcer Botnet?

Today, we're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint security and cyber defense strategies. We’ll be diving into the anatomy of the GoBruteforcer botnet, a threat that highlights a startling intersection of modern development practices and

MITRE Unveils New Embedded Systems Threat Matrix
Endpoint & Device Security MITRE Unveils New Embedded Systems Threat Matrix

As modern society becomes increasingly dependent on interconnected devices, the silent, invisible computers embedded within critical infrastructure—from power grids and medical devices to autonomous vehicles and industrial robotics—have emerged as a significant and often unprotected attack surface.

Supply Chain Attack Targets n8n Users' Credentials
Endpoint & Device Security Supply Chain Attack Targets n8n Users' Credentials

As a security specialist with deep expertise in endpoint security and cyber strategy, Rupert Marais has a unique vantage point on the evolving landscape of digital threats. We sat down with him to dissect a recent, sophisticated supply chain attack that shifts the focus from individual developers

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later